First published: Tue Sep 27 2022(Updated: )
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to server-side request forgery (SSRF). By sending a specially crafted request, an attacker with local network access could exploit this vulnerability to obtain sensitive data.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Websphere Application Server | <=9.0 | |
Ibm Websphere Application Server | <=8.5 | |
Ibm Websphere Application Server | <=8.0 | |
Ibm Websphere Application Server | <=7.0 | |
Ibm Websphere Application Server | >=7.0.0.0<7.0.0.45 | |
Ibm Websphere Application Server | >=8.0.0.0<8.0.0.15 | |
Ibm Websphere Application Server | >=8.5.0.0<8.5.5.22 | |
Ibm Websphere Application Server | >=9.0.0.0<9.0.5.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35282 is a vulnerability in IBM WebSphere Application Server that allows server-side request forgery (SSRF) attacks.
CVE-2022-35282 has a severity rating of 6.5 (Medium).
CVE-2022-35282 affects IBM WebSphere Application Server versions 7.0, 8.0, 8.5, and 9.0.
An attacker with local network access can exploit CVE-2022-35282 by sending a specially crafted request to perform server-side request forgery (SSRF) attacks and obtain sensitive data.
To mitigate CVE-2022-35282, IBM recommends applying the necessary security fixes provided by IBM for affected versions of WebSphere Application Server.